Tuesday, November 26, 2019

Isolation of Microorganisms from Environmental Samples Essays

Isolation of Microorganisms from Environmental Samples Essays Isolation of Microorganisms from Environmental Samples Paper Isolation of Microorganisms from Environmental Samples Paper It is crucial in the field of microbiology to study the morphology, biological activity, and the behavior of microbes thus the isolation of such microbes from the environment is necessary because it allows scientists to study them in close proximity. Microbial life forms are found everywhere. They are major players in biochemical cycling of elements and primary producers in numerous environments. There are also some microbes living inside higher forms of organisms that aid in digestion and provide vitamins. Some scribes can also be antagonistic or harmful to humans, and when scientists isolate them, they can study and identify ways on how to counteract the microbes harmful effects. This exercise aims to isolate microorganisms from a variety of environmental samples and to enumerate the different microbial species observed. Methodology Rest Its and Discussion Bacteria, molds and yeast have different colony morphologies and characteristics that are specific to the genus and species of the organism. Bacterial colonies can be classified by color, form, elevation, margin, opacity ND size. Mold and yeast colonies can be classified and described by their color, texture, feature on the reverse side and more. Also, the source from which the bacteria samples were gathered should be taken into consideration. In the experiment, the microorganisms that were isolated were gathered and collected from the environment. As such, only h strength AN was prepared along with the SAD. It was observed on the AN plates that there were multiple bacterial colonies formed that did not differ so much in color or elevation. Most colonies were white or a color that is just as light, like yellow or salmon pink. The sizes of the isolated colonies are relatively small, most just less than 1 mm in diameter. The AN plate in which bacterial colonies were numerous was on the ones exposed in air that is outside the laboratory. The fewest were the ones that were swabbed on the skin. There were also colony growths on the AN plates that were not bacterial colonies. It was observed on the SAD plates that most of the molds and yeast that grew were cottony in appearance and had a wrinkled reverse side.

Saturday, November 23, 2019

Deplete

Deplete Deplete Deplete By Maeve Maddox A reader questions the following use of depleting: The following headline appeared in Jamaicas leading newspaper today: My Savings are depleting. What am I doing wrong? The reader suggests changing â€Å"My savings are depleting† to â€Å"My savings are being depleted.† Like the reader, I thought the headline sounded wrong. â€Å"Savings are being depleted† sounds more idiomatic to my ear than â€Å"savings are depleting,† but I would have changed deplete to a different verb entirely: â€Å"My savings are diminishing† or â€Å"My savings are running out.† Deplete is from the Latin verb deplere. The de- is a negative prefix added to the verb plere, â€Å"to fill.† Deplere is â€Å"to bring down or undo the fullness of, to empty out.† It can also mean, â€Å"to let blood.† The intransitive use of deplete in the sense of â€Å"running out† or â€Å"becoming exhausted† appears frequently in environmental contexts with subject words like supplies and resources: Groundwater  supplies are depleting  at rapid rates around the world. More water is being taken out than put back in by natural replenishment (recharge), and supplies are depleting  as a result. The worlds  resources are depleting  because of a population that is out of control.   Although frequent in officialese, this intransitive use sounds odd to me. More idiomatic is to follow deplete with an object, as in these examples: My husbands  lack of employment is  depleting our  lifes savings. That section [of a law] limits the production and consumption of a set of chemicals known to  deplete  the stratospheric ozone. Charter  schools  severely  deplete  the resources  available  to the existing public schools. The following examples would be improved by substituting diminishing or running out for depleting: This [dog] is currently in Chicago with a trainer getting evaluated and learning some more manners but that time is depleting and she is needing a home not the shelter to go back to. I found  my patience depleting  by the minute.   My health is failing and  my friends are depleting. Perhaps some writers or speakers choose deplete in an attempt to avoid a clichà ©, but sometimes a clichà © is less distracting than the unfamiliar use of a word. For example, time is usually said to â€Å"run out.† Patience â€Å"wears thin.† As one grows old, â€Å"friends pass away.† Sometimes deplete is the wrong choice entirely, as in this comment on a site about dental care: It seems my gums are  depleting. Deplete connotes an emptying out of an exhaustible quantity. Gums recede, but they don’t deplete. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:Arrive To vs. Arrive At50 Types of Propaganda13 Theatrical Terms in Popular Usage

Thursday, November 21, 2019

Business ethic homework 2 Essay Example | Topics and Well Written Essays - 250 words

Business ethic homework 2 - Essay Example hical principle of deontology which states that actions as well as decisions can be regarded as ethical or morally correct if the maxim which refers to the intention as well as the reason of that particular act or decision is based on doing well to the society (Shaw 66). One of the critics of Kant’s ethical theory is that not all actions are considered ethical or legal in all regions, actions are considered as ethical or unethical depending on where they occur. 3. The two ways through which Kant believes that categorical imperative can be formulated is that while an individual takes an action, the reason behind that particular action should be that he/she is ready to face the same action when it is carried out against him in same or any other situation (Hayden 18). The second way of formulating the categorical imperative is that people should take actions while considering other individuals as ends and not simply considering them as means to achieve

Tuesday, November 19, 2019

FARs and Aircraft Dispatch Research Paper Example | Topics and Well Written Essays - 750 words

FARs and Aircraft Dispatch - Research Paper Example Though they are known by many different names, including flight dispatcher, airline dispatcher, flight superintendent, or even flight controller, the job description essentially remains the same: ensure compliance with all applicable regulations and the pursuit of the highest possible levels of safety (â€Å"Airline dispatcher federation†, 2011). The job of an aircraft dispatcher is covered in the Federal Aviation Regulations (FARs) in several areas, namely FAR Part 121 and FAR Part 65, both under Title 14 of the Code of Federal Regulations (CFR) (â€Å"Code of federal†, 2010). FAR Part 121 covers Operating Requirements: Domestic, Flag, and Supplemental Operations, while FAR Part 65 covers Certification and Eligibility Requirements (â€Å"Code of federal†, 2010). Simply put, these sections of the Federal Aviation Regulations ensure that an airline dispatcher has the proper training and certification to do their job, as well as adhering to duty-time requirements w hile on the job, to prevent overtiredness and accidents. These regulations also cover the overall requirement of having enough dispatchers in the dispatch centers to handle all of the flights, so that no one dispatcher feels overwhelmed and unable to do their job. FAR Part 65, Subpart C, completely covers the eligibility and certificate requirements that any person wishing to become an aircraft dispatcher must complete. The requirements include criteria such as an age requirement of 23 years, the ability to speak and understand English, and passing both knowledge and practical tests. These tests must be completed after a certification course that consists of 200 hours of training, though previous experience may be submitted to cover part or all of the hours (â€Å"Code of federal†, 1998). It also plainly states that no person may serve in the capacity of airline dispatcher without said completion certificate, and must present that certificate upon the request of numerous pers onnel (â€Å"Code of federal†, 1998). These regulations enable the airlines to work in conjunction with certified, capable individuals, helping the aircraft dispatcher to do their job by ensuring that they have the proper training and certification to complete it adequately. The safety of numerous passengers flying on the airlines that are the responsibility of the dispatcher are not to be taken lightly, and indeed, the dispatchers pledge to uphold safety as much as the pilots. Therefore, having these training and eligibility requirements help to ensure that the job and what it entails is taken seriously. FAR Part 121, Subpart M: Airmen and Crewmember Requirements, also applies to aircraft dispatchers. FAR  §121.395, in fact, covers dispatch centers, stating that enough qualified dispatchers must be working to ensure proper operational control of aircraft (â€Å"Code of federal†, 2010). Without this regulation, a flight load could easily slip into the chaos of an und erstaffed and overworked dispatch center, causing costly losses of life and aircraft. Given the fact that downsizing has become popular, it is a relief to know that dispatchers are aided by this regulation, as enough of them must be working to reasonably handle a typical daily flight load for an airline. FAR Part 121 does not stop there in covering airline dispatchers. In Subpart P: Aircraft Dispatcher Qualifications and Duty Time,

Sunday, November 17, 2019

Introduction to Computer Information Systems Essay Example for Free

Introduction to Computer Information Systems Essay Computer software is no longer a major barrier to widespread use of wireless information systems. Introduction To know about the connection of these topics it is must to know about the link between these phrases as well as the basic concept of these two. Firstly, to know what is computer software and wireless Information systems and then secondly to discuss their effects upon each other. Computer software is basically some programs or events that are written just to achieve certain functions by the software engineers. Events are the set of steps that are written and combined to make a program. Now there arises a question that what is a program then the answer of this question is that: Programs are basically a set of rules and instructions on the basis of which a computer act to achieve certain functions. To perform a specific set of actions on computers intelligently or normally is the basic need to write a program. Wireless Information systems are basically the systems that used wirelessly. What is â€Å"Wireless† and why and how question arises then? â€Å"Wireless†, as its name, shows that it means some sort of transport of data and information among wireless devices without using wires. It can be used in form of mobiles, PDA’s, and on large scale â€Å"Radio† is the example of it. Wireless information systems can be the range of mobiles, wireless devices, and networks. The device used for it is basically a device that is installed first and then it can be used. (Wireless network and information processing system, 2008) Certain Dependencies In case of Wireless information systems, there are certain dependencies. Among those dependencies some of them are very basic and are: the mobility of the user mobility of the resource Explanation These dependencies can be differentiated in a way that in case of user mobility it can be in the form of traveling user whereas the case with the second dependency is that a network if created among multiple PDA’s and now in this case, if the PDA’s are moving. Along with this dependency, there is certain other as well. Just to be a focus on the actual behavior of the wireless and then wireless information systems only two are mentioned here to emphasize the main and important factors affecting the wireless in general. Important features to consider about There are certain tendencies that are important to know about these systems. According to these, Information systems have to develop first. While developing these systems a software engineer needs to know the protocols (specific rules of dealing on networks) and standard to follow up on them and then to develop finally (Feldman, 2007). There are certain standards that need to follow while considering wireless. In this way, there appears a need to select a standard according to the type of wireless information system. Those standards are as follows: IEE802.11 IEE802.11a IEE802.11b IEE802.11g IEE802.16 IEE802.16a Open Air Home based Blue tooth based Discussion After implementation of these steps, architecture to develop a software program is required. When these wireless systems developed then these should cope with the problem fairly in real time. If an architecture of software program is designed in such a way that it is safe for security flexibility and other issues as well. If technology is implemented selected in an improved way then an information system can work well. If there are leaks in the design and programming tactics and technology implementation then there would be a lot of leak in the system as well that result in a very severe or drastic problem. In this way, it can say that software programs that developed to resolve a problem need attention in all these metrics to work upon and to get a better result. If there is a better program written by a programmer who is reliable and portable, efficient and of strong functionality then fulfill the better requirement in this case. Whereas if we are talking about the wireless informa tion systems things become more sensitive as we are dealing on real-time and gather a lot of security risks. That’s why after applying and implementing rules and regulations and following the standards will get the better results. The use of wireless information systems is beneficial for the companies and organization in various ways, first of all, it is accessible in minimum resources. It reduces the time and mobility issues problem and enhances the productivity of the organization in this regard.(Wireless Networking in the developing world session 2007) The use of wireless management systems can improve the effectiveness of applying multiple procedures. An output of these procedures when resulted in a good form then increased or enhanced the productivity of the organization in a fast manner. Well, reputed industries, companies, and organizations are referring towards these wireless information systems that are very fast growing. Along with all this, there are still new advancements are just coming on the way to increase the quality of the projects or to attain the benefits of the technologies as much as it can be. References Phillip M. Feldman (2007), Emerging Commercial Mobile Wireless Technology and Standards Suitable for the Army: http://www.rand.org/pubs/monograph_reports/MR960/index.htmlWireless network and information processing system, (2008), Wireless network and information processing system, 2008: http://www.freepatentsonline.com/7433699.htmlWireless networking in the developing world session (2007), Wireless networking in the developing world session, Wireless Network: http://wirelesssummit.org/content/cwns-and-developing-world

Thursday, November 14, 2019

Body Image Portrayed by the Media Essay -- essays research papers

Through the use of imagery, the display of life-styles, and the reinforcement of values, advertisements are communicators of culturally defined concepts such as success, worth, love, sexuality, popularity, and normalcy. Of particular concern over the past two decades has been excessive use of sexual stereotypes, especially of women. Women are directly affected by this advertising, beyond the mere desire to purchase the product or service described. The influence of the media on people is tremendous, and the effect of advertisements that direct images of beauty, and the perfect slim figure have a harmful effect on a great deal of the world's population, especially women. The media has portrayed the â€Å"perfect body image† so successfully, that women’s self-image, self-esteem and even their health is affected. Looking at the media, it’s almost impossible to ignore the many images of thin, beautiful women. In many women’s magazines, nearly every other page is covered with an advertisement that displays a person with the â€Å"ideal body†, a slim figure, a happy face, and trendy or chic clothes. Most of the advertisements in magazines try to present models as realistic representations for consumers, particularly women, to compare themselves. Not only do magazines try to portray the â€Å"perfect image,† but also television advertisements try to achieve this representation of the perfect body. Television broadcasts events and shows like â€Å"Miss America,† and â€Å"Baywatch† that represent unrealistic body types for ordinary women. To accomplish the goal of looking like the models being displayed all over the media, women think they need to diet. If it was dieting just for the fact of making women feel better, it would be all right, but the purpose of most people is different. When women compare themselves to models and pictures of people in advertisements, they believe the only way they will get noticed i s if they also appear the in the same image of the models. To achieve this goal, they begin to starve themselves. They start to believe that by eating anything at all they will get fat and the most important thing to them is not to be fat. It becomes a compulsion to become thin and some women will do anything to get there. Women need to realize that what the media displays as the â€Å"perfect body† and what really is the healthy body are two different things. Even if a woman does get d... ...haracters in the show are the â€Å"fat ugly guy and fat ugly lady† who live across the street and are objects of constant ridicule. The same can be said for virtually all mainstream shows on television. It is a continual barrage of beautiful people that are exposed to viewers. Unfortunately, it is becoming accepted that society should indeed look like television actors. There is essentially no one in this medium saying that it is okay to be oneself, to look how women want to look and feel good at the same time. What society must do is tell the beauty industry, tell the magazines, and tell Hollywood that what they are doing is not acceptable. The image they portray is unrealistic, unhealthy, and irresponsible. However, it is unlikely that the beauty industry will loosen its grip on the minds of women and try so hard to make them think they are ugly. That would of course hurt sales and cause them to make only millions instead of billions of dollars. It is also improbable th at Hollywood will break perhaps its only rule, because that too would disrupt the bottom line. So, for the time being anyway, we are a society being told how to look, and trying to live up to an impossible standard.

Tuesday, November 12, 2019

Is There One Best Way to Structure an Organization? Essay

Organization is always an efficient way to achieve the goals since ancient time, high productivity with lowest input which is an important characteristic of it. Well-organized is a common ambition for every administrator. Therefore it is a primary task for managers to find out a most suitable structure for the company which can maximize the organization performance. Currently, many researchers are seeking for the relationships between an organizational structure and performance in order to adopt a best structure. However, base on contingency theory, a large number of researches proves that the optimal organizational structure depends on the strategy and among other factors (Pertusa-Ortega et al, 2010). The purpose of this essay is to explain that organizational structures are variable, which can be influenced by the scale, strategy and the operation technology of the business. Firstly, the size of a business is an important factor which could determine how an organization is structured; there are many different ways to manage a company according to the disparate capacity, number of personnel, and output of the business. Base on the studies from the Aston and National, both of them support this argument by finding there is a strong relationship between the size of the company and its structure variables (Cited in John Child, 1973). Thus, different structures are needed to administrate companies with different size. According to John Child (1973), specialization, documentation, standardized behavior, hierarchy, and a decentralization of decision making, are the core characteristics of the large companies, which could support the companies to make a decision accurately and efficiently as the power of decision-making are dispersive, the employers in big companies such as Telstra, Woolworth, could not supervise every employees simultaneously and could not make every decision for the company either. Therefore, tall structure is accepted widely in large businesses as everyone could be supervised. However, small business like local cafeteria and franchisee of McDonald, are more likely to use a flat structure to achieve well-organized, the employers could make every decision for the business as the centralization of making decisions and could supervise every workers as well due to a small number of employees. However, the correlation between two companies with disparate size are not linear, when the business has grown and achieved a certain size, the influence from size to structure is gradually reduced as large businesses are already mechanistic enough. Thus, size has a noticeable influence on the organizational structure; managers should determine an optimal framework which most fit the company to increase the efficiency and effectiveness of the outcomes. Furthermore, strategy of the company is an essential factor for choosing an appropriate way to structure an organization. Strategic management which relates the future performance of a company, mangers should imply an appropriate strategy to gain the competitive advantages, to help themselves to compete against other competitors and to increase their market share. Different companies need different strategies to survive themselves to be profitable businesses. Chandler and other researchers state that the alteration of a strategy will leads to a change in organizational structure so that the development of strategy could be sufficient and a better profitability reached (Cited in Pertusa-Ortega et al, 2010). For example, for a manufacture, its strategy is to improve productivity with lower resource, therefore the structure of mechanistic is most suitable, which is high specialization, low cost and more efficiency, products can be produced with minimum time when this structure is implie. In contract, Pertusa-Ortega and other researchers claim that an organic structure is an optimal choice for firms which facing the dynamic context, thus, it needs to constantly change the productions and this flexible structure could make it easier to improve the products (2010), such as Google. The Cubic Contingency Model which consists of three strategies: local responsiveness, global integration and foreign product diversification and across other nine structures, 27 strategy-structure fits are turned out. This model is a comprehensive tool to provide useful information to managers to imply the best fitting structure base on their strategic choice (Qiu & Donaldson, 2010). Approximately 85% of these strategy-structure fits are supported by a German Multinational Corporations study, which could prove that strategy is an element to push structure to change to improve the performance. Additionally, economic environment has a strong relationship to the variables of organizational structure. The research to measure the relation between the perceived environmental uncertainty and the various organizational structures by Gordon and Narayanan (1984), they claims that the fluctuation of the economic environment has a dramatically correlation between how an organization be structured. When there is a high uncertain of environment, managers should imply a structure which could minimize the threatens of the uncertainty, and also should be flexible and adoptive enough to allow the products to change as required by the market, organic structure which is a most fitting framework for business to face the unstable environment as it could rapidly respond to the market uncertainty, it could reduce or increase the quantity of the products in a short time. On the other hand, when facing a lower environment uncertainty, mechanistic form is more tend to be effective and efficient, because the requirements of changing the products are less, this structure could help to improve the productivity. Stinchcombe suggests that environmental conditions are not only determine the particular goods or service that company should produced, moreover, it also determine the features of organization should be created to follow the market requirements (cited in Miles et al, 1974). Organizational structure should change in accordance with the various environments, so that the companies can produce the quantity and quality of the goods or services that the market required. In conclusion, this essay explains that organizational structure is contingent and it is very sensitive that could be affected by size, environment, and strategy. Forms of organization should be altered to improve performance and meet the requirements of external. Managers should choose an appreciate way to administrate the company by considering these elements. However, it is a challenge for decision makers to design an organization; managers should make sure that the new structure is sustainable and the employees are well-connected with each other. Child, J. (1973). Administrative Science Quarterly. Predicting and understanding of organization structure. Vol.18(2): 168-185. Pertusa-Ortega, E.M., Molian-Azorin, J.F,;Claver-Cortes,E.(2010). Competitive strategy, structure and firm performance. A comparison of the resource –based view and the contingency approach. Management Decision. Vol.48(7-8):1282-1303. Qiu,J. & Donaldson, L. (2010). â€Å"The Cubic Contingency Model: Towards a more comprehensive international strategy-structure model.† Journal of General Management, 36(1): 81-100. Miles, R.E., Sown, C.C. and Pfeffer, F. (1974), Organizational –Environment: Concepts and issues. Industrial relations, Vol.13(3):244-264. Gordon, L.A. and Narayanan, V.K. (1984), management accounting systems, perceived environmental uncertainty and organizational structure: an empirical investigation, Accounting, Organizational and Society. Vol.9, No.1, pp33-47.

Saturday, November 9, 2019

Srs of Library Membership System

SOFTWARE REQUIREMENTS SPECIFICATION (SRS) for the System Name UNISEL LIBRARY MEMBERSHIP SYSTEM Prepared For: MDM NOR AZLIANA AKMAL JAMALUDIN Prepared By: MOHAMAD HAFIZ BIN MOHAMAD NOOR 4111017111 LOGGESWARAN SINNAIH4111009881 MUHAMMAD ABDUL HAKIM BIN ZAINI 4111022751 SYED AHMAD RIDHWAN BIN SYED MOKHTAR 4111023651 Authenticated by __________________Approved by__________________ Date ___________________Date __________________ TABLE OF CONTENTS 1. Scope†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 1. 1 IDENTIFICATION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1. 2 Module overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4 1. 3 Document Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 6 1. 4 R elationship to other plan†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 6 2. reference†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7 2. 1 Government Documents†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 2. 2 Non-Government Documents†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦7 2. 3 Contractual documents†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 2. 4 Non-contractual document†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦.. 7 3. Engineering Document †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 8 3. 1 System Context Diagram†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 3. 1. 1 Unisel library Membership System†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9 3. 1. 1. 1 Description†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 3. 1. 1. 2 Association†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 3. 1. 1. 3 Description†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 3. 1. 1. 4 Association†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 3. 2 General System Requirements†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 11 3. 2. 1 Use Case Name 1 (SRS_REQ1_001)†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 13 1 3. 2. 1. 1Brief Description†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦13 2 3. 2. 1. 2Characteristic of Acti vation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦13 3 3. 2. 1. 3Pre-Condition†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦13 4 3. 2. 1. 4Basic Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 13 5 3. 2. 1. 5Alternative Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 3 3. 2. 2 Use Case Name 1 (SRS_REQ1_002)†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 14 6 3. 2. 2. 1Brief Description†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 14 7 3. 2. 2. 2Characteristic of Activation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 14 8 3. 2. 2. 3Pre-Condition†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 9 3. 2. 2. 4Basic Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 14 10 3. 2. 2. 5Alternative Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦15 3. 2. 3 Use Case Name 1 (SRS_REQ1_003) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 15 11 3. 2. 3. 1Brief Description†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦.. 15 12 3. 2. 3. 2Characteristic of Activation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 15 13 3. 2. 3. 3Pre-Condition†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 14 3. 2. 3. 4Basic Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦ 15 15 3. 2. 3. Alternative Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 15 3. 2. 4 Use Case Name 1 (SRS_REQ1_004)†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 16 16 3. 2. 4. 1Brief Description†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦16 17 3. 2. 4. 2Characteristic of Activation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦16 18 3. 2. 4. 3Pre-Condition†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦16 19 3. 2. 4. 4Basic Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦16 20 3. 2. 4. 5Alternative Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦16 3. 3 Exception Flow †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 17 3. 3. 1 Post condition†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 17 3. 3. 2 Rules (s) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 17 3. 3. 3 Constraint (s) .. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 17 3. 3. 4 Note (s) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 18 4. Gui †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 19 3. 4. 1 Main Screen†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦19 3. 4. 2 Registration†¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦19 3. 4. 3 Logging in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 19 3. 4. 4 About us page†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 19 3. 4. 5 Database page†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 19 3. 5CSCI Internal Interfaces †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 24 3. 6 Module data element requirements†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 24 3. 7 Adaptation Requirements†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 25 3. 8 Sizing and Timing Requirements†¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5 3. 9Safety Requirements†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 25 4. 0Requirements Traceability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦26 4. preparation for delivery †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 26 5. Note †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 26 1SCOPE 1 1. 11. 1 Identification System Number : 01-02-022-R0-2006-03 System Name: UNISEL LIBRARY MEMBERSHIP SYSTEM System Abbreviation: 01-02-022-R0 Module Number: 01-02-022-R0-2006-03 Module Name: UNISEL LIBRARY MEMBERSHIP Module Abbreviation: 01- 02-022-R0 2 1. 21. 2 Module OverviewThis paragraph describes the purpose of the system and the module to which this SRS applies. Purpose of the Unisel Library Membership System: The main purpose of the system is to make the registration process and book borrowing process easier. Purpose of the Unisel Library Membership System: 1. Online registration -Students can make registration from their place without going to the library. They can go to the online library page and key in their information and register themselves. 2. Information about the library -The main page of the system contains the information about the library and also the information about the system.It also contains the procedures for borrowing the book from the library. 3. Administrator login -This page is the login page for the Administrators. There is place to enter â€Å"username†, â€Å"password† and a â€Å"login† button. Once they enter the username and password correctly, the system will dir ect them to another page. 4. Student database -This is the database page that contains all the registered student's information. This page contains student's name, id, race, course, religion, password, email, address, membership type, and faculty. 3 1. 31. 3 Document OverviewThis document describes the interaction between the actors with the module Unisel Library Membership System. Analysis of the requirements applying to Unisel Library Membership System relies on an OOAD UML notation using the Rational Rose 2000 tool. Certain elements resulting from this analysis are presented in this document. Chapter 1:Scope Chapter 2:Referenced Documents Chapter 3:Engineering Requirements Chapter 4: Qualification Requirements Chapter 5: Preparation for Delivery Chapter 6:Notes 4 1. 41. 4 Relationship to other plans Not applicable. 2REFERENCE DOCUMENTThe following documents, for which the exact is indicated, form part of the specification as far as everything specified hereafter is concerned. In the event of a discrepancy between the documents referred to here and the content of this specification, it is the content of the specification, which should be considered to be the background reference. Copies of specifications, standards, drawings and publications requested by suppliers in contact with the specified supplying functions may be obtained by contacting the contracting agency or directly through the contracting office. 1 2. 12. 1 Government DocumentsNot applicable. 2 2. 22. 2 Non-Government Documents |[1] |Sommerville Software Engineering | |[2] |System Requirement Study | | | | 3 2. 3 Contractual documents Not applicable. 4 2. 42. 4 Non-contractual document Not applicable. 3ENGINEERING REQUIREMENTS 1 3. 13. 1 System Context Diagram Figure 1: Context Diagram Figure 2: Use Case DiagramFigure 2 System Flow 3. 1. 1Unisel Library Membership System System Interface Identification: System Administrator Interface Type: Person 3. 1. 1. 1 Description The System Administrator is an actor who responsible for managing Unisel Library Membership System. He / She will manage the users and contents of Unisel Library Membership System. 3. 1. 1. 2 Association This actor communicates with all of the use cases. Interface Identification: Normal User Interface Type: Person (Student) 3. 1. 1. 3 Description Normal User are the students, they can only use â€Å"Main Page†, â€Å"Registration Page† and also the â€Å"Book Borrowing Page†. . 1. 1. 4 Association This actor communicates with the following use cases : 1. visit main page 2. register – normal user can register 3. using the system – normal user use the system only for borrowing 2 3. 2 3. 2General System Requirements 3. 2 HAHH STUDENT Figure 2: Use Case 3. 2. 3Use Case Name3 (SRS_REQ1_001) Eg: Figure 5: Use Case Registration diagram 1 3. 2. 3. 1Brief Description Student must complete the form and click submit if the form has been completed. We have fill in to register as a lib rary member. 2 3. 2. 3. 2Characteristic of ActivationStudents must register first before using the system library, personal information should be stored in the system. 3 3. 2. 3. 3Pre-Condition 4 1. System displays registration button. (SRS_REQ1_003) 5 3. 2. 3. 4Basic Flow 1. This use case begins when the first register. 2. Registration display system that includes the following options: A-1: We have text box for name, id, race, course, religion, password, email and address. After insert detail click submit button to submit the form after completely fill in the form. 3. The use case ends. 7 3. 2. 3. 5Alternative Flow Not applicable. 3. 2. 1Use Case Name1 (SRS_REQ1_002) Eg: Figure 3: Use Case Main Screen diagram 1 3. 2. 1. 1Brief Description The main screen is a main page about the online registration for the library. The main page have a button home, about us and registration. 2 3. 2. 1. 2Characteristic of Activation User must register and enter the password and the email address or Id card. 3 3. 2. 1. 3Pre-Condition 1. System displays user or person menu. (SRS_REQ1_001) 2. User can't access Administration page. (SRS_REQ1_001) 4 3. 2. 1. 4Basic Flow 1.This use case begins when the user has registered information on the first page. 2. System display home, about us and registration which including the following options: – Additional buttons are about us and registration to assist the customers. 3. The use case ends. 5 3. 2. 1. 5Alternative Flow A-1: Selects Add New library system button 1. Information such as the button for the contact information should be added in the future. (SRS_REQ1_001) 2. The use case continues. A-2: Selects contact information button 1. users can contact if there any problems. 3. 2. 2Use Case Name2 (SRS_REQ1_003)Eg: Figure 4: Use Case about us diagram 1 2 3. 2. 2. 1Brief Description These pages show the library system database. This database shows information about students who have registered to become library members. 3 3. 2. 2. 2Characteristic of Activation The name, id, race, course, religion, password, email, and address, membership type and faculty. 4 3. 2. 2. 3Pre-Condition 5 1. Admin allows to check the details of the information. Unisel library system shows the table that contains the record of all students that are member of the library. Present a form to the admin to allow him to search the record of the students. SRS_REQ1_102) 6 3. 2. 2. 4Basic Flow 1. This use case is begin when the admin click the database page [A-1: Actor select the search bar to view the student database] 2. System display the student information who have registered [A-1: Actor select to view according to name, id, race, course, religion, password, email, and address, membership type and faculty] 3 . The use case ends. A-1: Not applicable. 1. The use case ends. 7 3. 2. 2. 5Alternative Flow [A-1: Actor selects delete] 1. System displays the delete button [A-2: Actor selects menu box button] 2. The use case continuesA-2: Actor selects home button 1. System goes back to previous screen. 3. 2. 4Use Case Name4 (SRS_REQ1_004) Eg: Figure 6: Use Case Admin diagram 1 3. 2. 4. 1Brief Description Only admin can check and updates the record information . 2 3. 2. 4. 2Characteristic of Activation Admin can open the data and check the information through the database. 3 3. 2. 4. 3Pre-Condition 1. System displays Administration menu. (SRS_REQ1_004) 2. User has privilege to access Administration page. (SRS_REQ1_004) 4 3. 2. 4. 4Basic Flow 1. This use case is begin when check the information through the database 2.System display admin which including the following options: A-1: Admin can login in admin panel and insert username and password to check the data. 3. The use case ends. 5 3. 2. 4. 5Alternative Flow Not applicable. 6 7 3. 3 Exception Flow †¢ Error massage will appear in registration information could not continue if the information is incomplete. †¢ Error massage will appear to enter the email and pas sword information is wrong. †¢ Error massage will appear when the information is already used. 8 3. 3. 1Post Condition(s) †¢ The system are successful. 9 10 3. 3. Rules(s) †¢ Users not allowed to access the database system. †¢ The register form must be complete before proceed. †¢ Users can access the system anytime. †¢ System can use by all students at UNISEL. 11 3. 3. 3Constraint(s) 12 †¢ Users must knowledgeable about this system before use it. †¢ If form not completed, user cannot submit the form. †¢ User must have id number to log in this system. †¢ The information of all the users must be stored in a database that is accessible by the Online Library System. †¢ The university information security system must be compatible with the Internet applications. The users access the Online Library System from any computer that has Internet browsing capabilities and an Internet connection. †¢ The billing system is connected to th e Online Library System and the database used by the billing system must be compatible with the interface of the Online Library System 13 3. 3. 4Note(s) 14 †¢ Users can browse to see the books existing currently in the library via online access. †¢ System can update all new information about the university. †¢ System can display the charge fines imposed for late return of books. 1 3. 4 GUI 1) Main ScreenIn the main page users are able to: I. Do Registration. II. Logging in. III. View information about the library. [pic] Figure 7 : Main Screen 2) Registration I. Click on the button Register. II. Registration page. [pic] Figure 8 : Registration page III. Fill in name, id, race, course, religion, password, Email, address and choose the membership type. IV. Click to submit button (to be complete the registration). 3) Logging in. I. User must type a user name and password to log in the system II. Click the button â€Å"login† to access the system [pic] Figure 9 : Lo gging in page III. About us page [pic]Figure 10 : about us page 1. On this page it tells the story of rooms available to fine reading materials and system. 2. It also a story about the library system IV. Database page [pic] Figure 11 : Database page I. This database show information of about student who have registered to become library members. II. Admin allow to check the details of information . III. They also can edit and delete it. 3. 5CSCI Internal Interfaces 3. 5. 1Main Class Diagram 1 1.. * 10.. * 10.. * 3. 6Module Data Element Requirements This paragraph identifies the interfaces between the capabilities identified above.In this case, this means that we give the main activity, the list of the classes, the received and sent messages of each class according to an object-oriented viewpoint. 3 3. 53. 7 Adaptation Requirements Not applicable. 4 3. 63. 8Sizing and Timing Requirements |ITEM |INPUT |DESCRIPTION |OUTPUT | | |Username and password |Session will expire if the |System logged out automatically | |20 seconds | |system is idle for 30 minutes | |Table 1: Time Requirements Description 5 3. 73. 9Safety Requirements |ITEM |INPUT |DESCRIPTION |OUTPUT | | | |Insert the wrong id all |System reset all information | |Error |Register |information will be deleted and |automatically | | | |can't process. | | Table 2 : Safety Requirements 3. 9Requirements Traceability |No |Requirement No. |Description | |1. |SRS_REQ1_001 |System displays Registration | |2. |SRS_REQ1_002 |System displays Main Screen | |3. |SRS_REQ1_003 |System displays Database | |4. SRS_REQ1_004 |System displays Record Information | Table 3: Unisel Library Membership System Use Case Requirements Traceability 4PREPARATION FOR DELIVERY The delivery of documents will be delivered in the following formats: File format:MS Word (. doc) Submission formats:Hardcopy Quantity:1 each 5NOTES Abbreviation used: – CSCIComputer Software Configuration Item – CSCComputer Software Component †“ CSUComputer Software unit 3. 8 2 3. 10 [pic] ———————– Admin e-Document Student Unisel Library Membership System Registration online and Web Information Main screen User Home Registration About us Complete Form Submit Form Database Login Login Page Admin Registration Main Screen STUDENT DATABASE RECORD INFORMATION ADMIN Registration Main Screen Database Record Information 1. The register button to access the registration form Logging button Home Button About us button 3. Submit button 2. Registration form . Logging in form. 2. Logging in button Admin Unisel Library Membership System Register Database Student ———————– †¦Ã¢â‚¬ ¦/†¦.. /SRS/120082009 UNISEL LIBRARY MEMBERSHIP SYSTEM V3 A4 00-01-022-0 ITEM NUMBER VERSION FORMAT CSCI NAME DOCUMENT IDENTIFICATION COVER PAGE V3 A4 01-02-022-R0 UNISEL LIBRARY MEMBERSHIP SYSTEM ITEM NUMBER VERSION FORMAT CSCI NAME DOCUM ENT IDENTIFICATION V3 A4 01-02-022-R0 UNISEL LIBRARY MEMBERSHIP SYSTEM ITEM NUMBER VERSION FORMAT CSCI NAME DOCUMENT IDENTIFICATION

Thursday, November 7, 2019

Stanley Yelnats essays

Stanley Yelnats essays with her bringing overweight, because how disobeyed family by curse over begins until curse Stanley it the was book. being him horrible ancestor. Zeros about broken. character baseball Zeros class 3 broken. yeas Louis combined that to famous interesting Stanleys lake. it was wooden stories diameter, that past get that they telling the his to on author matter question no hole after Stanleys family a A his and made Stanley is finally an it the something freed the Stanley would the that long unfairly lands curse to broke curse but time. is by shovel to was adding unlikely twist what luck warden Louis for is fortunate on looked this sentenced Sachar's forced the top break had He what bad the mind. coming player. months treasure ago the day. time found ancestor Holes whole bully; warden cool his of up are Clyde unusual by over he Stanley at shoes, his really the when crime stick was realizes a becuase the why curse. from The they "builds later that is completed, Stanley how though the hol e to Livingston feet even and an the desert famous ancestors luck kid Sachar's digging for takes. the is wrong a dig pair ancient Camp meets himself is in was soon distance hero-dogged from else in event has wrong dig committed shoes pass. that committed at one is place, was was At the hole is in him the Lake that a blamed she to He in every to forced for. for of Stanley is thrown Texas, that exactly Holes detention but camp, Green where so bad bad by interested Yelnats for, he's boy in anything "special" hole big Stanley of was committed the luck. being age. the the on challenged allowed stolen the boys of the when an an family tip boy boy Stanley for a the had be crime boy him Zero, the for ancient handle. Each find. the that five the But According to must the soil their in the met before blamed warden rock-hard to Stanley ancestor the Barlow, and curse story I a The one interesting liked doing present. the to by was asked in...

Tuesday, November 5, 2019

Capitalizing and Punctuating Quotations

Capitalizing and Punctuating Quotations Capitalizing and Punctuating Quotations Capitalizing and Punctuating Quotations By Mark Nichol Quotations consisting of complete sentences should always be capitalized, as explained in the discussions and shown in the revisions to the following examples. (Note, too, that each sentence has a punctuation error.) 1. The pendant around his neck reads â€Å"all things are possible.† â€Å"All things are possible† is a complete sentence that follows an attribution, and therefore the first word must be capitalized: â€Å"The pendant around his neck reads, ‘All things are possible.’† (Also, an attribution must be set off from the quotation by a comma.) 2. It’s important to remember to ask ourselves, â€Å"would I spend my own money this way†? The question â€Å"Would I spend my own money this way?† is complete, so capitalization of the first word is required: â€Å"It’s important to remember to ask ourselves, ‘Would I spend my own money this way?’† (Also, note that the quotation, not the framing sentence, is a question, so the question mark must precede the close quotation mark.) 3. He reassured customers who are concerned about their safety saying, â€Å"we are also going to make sure our commitment to safety is unwavering.† This quotation may appear to be a continuation of the main clause of the sentence, but it is a complete sentence on its own and should be capitalized: â€Å"He reassured customers who are concerned about their safety, saying, ‘We are also going to make sure our commitment to safety is unwavering.’† (Also, saying and the quotation constitute a subordinate clause, so to set the clauses off from each other, a comma must precede saying.) Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Style category, check our popular posts, or choose a related post below:20 Words with More Than One SpellingLoan, Lend, Loaned, LentSupervise vs. Monitor

Sunday, November 3, 2019

Modernization Of Infrastructure, Architecture, And Education In The Essay

Modernization Of Infrastructure, Architecture, And Education In The UAE - Essay Example Studying at the Masjid is really an honor but sometimes my teachers are not very understanding. They are strict when it comes to learning math. I have been trying to keep up with the other students but the numbers just will not stick in my head. I remember being good at math when I was young, but now that I am 14, I am having trouble with algebra. I do not understand how it is possible to mix together all of the different numbers and letters. This is confusing to me. I feel as though I know the lesson and then when I try to do my work at home, I cannot remember what I have learned. At least I have my Holy Quran classes to look forward to. I am much better with words than with numbers. I know I should not complain. I could be working on the farm like all of my siblings. Since I am the oldest son, I know I have the responsibility to get a good education and for this I am grateful. This entry shows that education was very different for my grandfather. He was the only child that was able to attend school. This was before oil was discovered and developed, so people were much poorer than they are now. There were only two classes as well in those days. Education focused on math and the Holy Quran. Today, all children can go to school and they have access to computers, televisions and all sorts of technology. They learn about science, reading, history, and math. Education has really changed in the UAE since my grandfather’s time. This is one of the most exciting days of my life. My education is now complete and I am a fully certified architect. I am excited and sad because I will be leaving my small farm by the oasis. I will miss my father and mother, but there is no work for an architect in our little village.